Thursday, 10 September 2015

41 In a Linux computer, which of the following files defines run levels for the processes to be started up during boot up?
A. /etc/inittab
B. /etc/syslog.conf
C. /etc/lilo.conf
D. /etc/runlevel
Answer: A

42. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-basednetwork. You have to create user accounts for four new Management Trainees. You also have to create a group named MT and provide membership of this group to the new user accounts. How will you accomplish this?
A. Use the ADDUSER command to create new user accounts and the MT group. Add the users account to the group.
B. Use the USERADD command to create new user accounts and the MT group.
Add the user accounts to the group.
C. Use the GROUPADD command to create the MT group. Use the USERADD command to create the user accounts and provide them the membership of the MT group.
D. Use the ADDGROUP command to create the MT group.
Use the ADDUSER command to create the user accounts and provide them the membership of the MT group.
Answer: C

43. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to check the errors of an ext2 filesystem. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. e2fsck
B. fsck
C. fsck -N
D. fsck.ext2
Answer: A, B, D

44. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged. Which of the following commands will you use to resolve the issue?
A. mount
B. e2fsck
C. fsck
D. mkfs
Answer: B

45. You work as a Network Administrator for Mac World Inc. The company has a Linux-based network. Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?
A. mkfs
B. mount
C. scanfs
D. fsck
Answer: D

46. Which of the following files is used to view the current status of RAID devices in Linux?
A. /proc/mdstat
B. /proc/stat
C. /proc/meminfo
D. /proc/mounts
Answer: A

47. Which of the following network protocols are used by the dhclient command to configure the IP addresses of computers on the network?
A. The dhclient command does not use any protocol. It statically assigns the address to the network computers.
B. RARP and DHCP
C. BOOTP and DHCP
D. BOOTP and RARP
Answer: C

48. You work as a system administrator for Tech Perfect Inc. The company has a Linux-based network. You are a root user on the Linux operating system. A user, Jetson, wants to view the speed and the duplex for his Ethernet card. His ethernet card is activated on interface eth0. Which of the following commands can you use to accomplish this task?
A. ifup eth0
B. ifconfig eth0
C. ip link show eth0
D. sudo ethtool eth0
Answer: D

49. Which of the following files are used to activate disk quotas on a file system?
Each correct answer represents a complete solution. Choose all that apply.
A. quotA.group
B. quotA.user
C. quotaon
D. .quotaon
Answer: A, B

50. You work as a Network Administrator for Perfect Solutions Inc. You are required to configure a hard disk for a Linux workstation. You are using the FDISK utility to configure it. Which of the following options will you use to show all the existing partitions of the hard disk?
A. n
B. w
C. 1
D. p
Answer: D